Sciweavers

1028 search results - page 77 / 103
» Using Attack Graphs to Design Systems
Sort
View
119 views 100 votes 15 years 6 months ago  IWPC 2002»
Program understanding tools manipulate program represensuch as abstract syntax trees, control-flow graphs, or data-flow graphs. This paper deals with the use of visitor combinat...
108 views 100 votes 15 years 7 months ago  HICSS 2007»
The SmartCampus initiative aims to turn an urban university campus into a living laboratory for location aware community system services. To lay a foundation for this effort, the ...
174 views 154 votes 14 years 11 months ago  TAOSD 2010»
Abstract. Aspect Oriented Modeling (AOM) techniques facilitate separate modeling of concerns and allow for a more flexible composition of these than traditional modeling technique...
131 views 110 votes 15 years 6 months ago  RTSS 2003»
Preventing denial-of-service attacks in wireless sensor networks is difficult primarily because of the limited resources available to network nodes and the ease with which attacks...
166 views 111 votes 14 years 11 months ago  SOCIALCOM 2010»
It is a widely held belief among designers of social tagging systems that tag clouds represent a useful tool for navigation. This is evident in, for example, the increasing number ...
133 views 96 votes 15 years 6 months ago  ACMSE 2004»
This paper presents a distributed multi-robot system designed to solve a team-based search and destroy task. The project was divided into two phases. The initial phase was used to...
131 views 112 votes 15 years 2 months ago  ICAD 2004»
Auditory Displays are quite well known in the research community, but very little of this experience is being transferred to product designers. The method of Design Patterns is we...
178 views 132 votes 14 years 10 months ago  IPPS 2010»
Abstract--Ensuring the correctness of complex implementations of software transactional memory (STM) is a daunting task. Attempts have been made to formally verify STMs, but these ...
116 views 100 votes 15 years 6 months ago  DATE 2003»
The ForSyDe methodology has been developed for system level design. Starting with a formal specification model, that captures the functionality of the system at a high abstractio...
289 views 159 votes 14 years 8 months ago  ISCI 2011»
It is well known that software maintenance and evolution are expensive activities, both in terms of invested time and money. Reverse engineering activities support the obtainment ...